0:23-cv-62421
Speech Transcription LLC v. Netsurion LLC
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: Speech Transcription, LLC (Wyoming)
- Defendant: Netsurion LLC (Delaware)
- Plaintiff’s Counsel: Law Office Of Barbra Stern PA; Garteiser Honea, PLLC
- Case Identification: 0:23-cv-62421, S.D. Fla., 12/29/2023
- Venue Allegations: Venue is alleged to be proper based on Defendant maintaining a regular and established place of business within the Southern District of Florida and committing acts of patent infringement in the district.
- Core Dispute: Plaintiff alleges that Defendant’s XDR cybersecurity platform infringes a patent related to a unified security management system for endpoint computing devices.
- Technical Context: The technology concerns architectural solutions for endpoint computer security, seeking to centralize and simplify the management of multiple security functions from different vendors.
- Key Procedural History: During prosecution of the patent-in-suit, the U.S. Patent Examiner identified and cited U.S. Patent No. 7,058,796 as a relevant prior art reference.
Case Timeline
| Date | Event |
|---|---|
| 2004-09-14 | '799 Patent Priority Date |
| 2015-01-20 | '799 Patent Issue Date |
| 2023-12-29 | Complaint Filing Date |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 8,938,799 - "SECURITY PROTECTION APPARATUS AND METHOD FOR ENDPOINT COMPUTING SYSTEMS", Issued Jan. 20, 2015
The Invention Explained
- Problem Addressed: The patent describes the state of enterprise network security as overly complex and costly. Deploying multiple defense and immunization software modules from various vendors on each host computer can lead to software conflicts, performance degradation, security vulnerabilities, and high total-cost-of-ownership (Compl. ¶15; ’799 Patent, col. 3:41-67).
- The Patented Solution: The invention proposes a "unified security management system" centered on a "Security Utility Blade" (SUB), which is a distinct hardware and software subsystem situated between the network and the host computer ('799 Patent, Fig. 1B). This SUB runs its own operating system, separate from the host, and functions as an "open platform" to host and execute security modules from multiple vendors, all managed by a central server. This architecture is intended to isolate security functions, simplify management, and create a more robust, homogenous "Unified Management Zone" (UMZ) ('799 Patent, col. 5:16-43).
- Technical Importance: This architectural approach sought to decouple security functions from the host operating system, thereby mitigating the conflicts and vulnerabilities inherent in managing a heterogeneous collection of software-based security tools directly on an endpoint.
Key Claims at a Glance
- The complaint asserts independent claim 14 ('Compl. ¶31).
- Essential elements of independent claim 14 include:
- A security subsystem configurable between a network and a host of an endpoint
- The subsystem comprising computing resources for providing:
- an open platform for receiving and executing security function software modules from multiple vendors for providing defense functions for protection of the host
- The complaint notes infringement of "one or more claims," preserving the right to assert additional claims (Compl. ¶31).
III. The Accused Instrumentality
Product Identification
The complaint identifies "at least the Netsurion XDR system" as an accused instrumentality (Compl. ¶27).
Functionality and Market Context
The accused product is described as a "threat detection, investigation, and response (TDIR) platform that is used for cybersecurity purposes within the different parts of organizations" (Compl. ¶27). The complaint provides a screenshot from Defendant's website listing its "North American Headquarters" in Fort Lauderdale, which may be used to support allegations of the product's availability and Defendant's business presence in the United States (Compl. ¶7, Fig. 1). The complaint does not provide further technical detail regarding the architecture or operation of the XDR system itself.
IV. Analysis of Infringement Allegations
The complaint references a claim chart in an "Exhibit B" that was not attached to the publicly filed document; therefore, a claim chart summary cannot be provided. The infringement theory is summarized below based on the text of the complaint.
The complaint alleges that the Netsurion XDR system directly infringes at least Claim 14 of the ’799 Patent, either literally or under the doctrine of equivalents (Compl. ¶¶ 31-32). The core of the infringement allegation is that the XDR system constitutes a "security subsystem" that provides an "open platform" for executing security functions from multiple vendors to protect host devices, thereby practicing the technology claimed in the ’799 Patent (Compl. ¶36). The complaint supports its venue allegations with a map screenshot showing Defendant's Fort Lauderdale office, the location from which infringing acts are alleged to have occurred (Compl. ¶8, Fig. 2). Direct infringement is alleged based on Defendant’s own use and internal testing of the system, while indirect infringement is alleged based on providing product literature that instructs customers on its use (Compl. ¶¶ 32, 34).
Identified Points of Contention
- Scope Questions: A primary question of claim scope will be whether the term "security subsystem," as used in the patent, reads on the accused Netsurion XDR system. The patent’s specification and figures repeatedly describe the subsystem as a distinct hardware/software component (a "Security Utility Blade" or SUB) that is separate from the host's operating system (’799 Patent, col. 7:6-10; Fig. 2A). The infringement analysis may turn on whether the accused XDR "platform," which is likely a software-based solution, can be considered a "subsystem" in the manner claimed.
- Technical Questions: A key factual question will be whether the accused XDR system functions as an "open platform for receiving and executing security function software modules from multiple vendors" as required by the claim (’799 Patent, col. 26:50-54). The analysis will require evidence of whether the XDR system is an integrated, proprietary system or if it allows for the installation and execution of third-party vendor security modules in the manner described by the patent. The complaint does not provide specific evidence on this point.
V. Key Claim Terms for Construction
The Term: "open platform"
- Context and Importance: This term is central to the claimed functionality. Its construction will be critical in determining whether the accused XDR system, which may integrate various functions, meets the claim's requirement of executing modules "from multiple vendors."
- Intrinsic Evidence for a Broader Interpretation: The specification describes the SUB as providing "an open platform for repository of defense function software modules and optionally, immunization agent software modules from any participating vendors" (’799 Patent, col. 6:51-54). This language could support an interpretation that covers any system capable of integrating with or utilizing security tools from third parties.
- Intrinsic Evidence for a Narrower Interpretation: The patent describes a specific architecture where modules are downloaded from vendors' systems, stored in a database associated with a management server, and then downloaded into a "Repository and Execution Unit" on the endpoint SUB (’799 Patent, col. 8:42-55). This could support a narrower construction limited to this specific download-and-execute repository model.
The Term: "security subsystem"
- Context and Importance: The patent's specification consistently frames the invention around a distinct hardware/software component, the "Security Utility Blade (SUB)," that runs its own operating system separate from the host (’799 Patent, col. 5:21-26). The dispute may focus on whether a software-only platform can constitute a "subsystem" as claimed.
- Intrinsic Evidence for a Broader Interpretation: Claim 14 itself does not explicitly require a hardware component, referring more generally to "computing resources" that provide a platform (’799 Patent, col. 26:48-49). This could be argued to encompass a purely software-based set of resources that functions as a subsystem.
- Intrinsic Evidence for a Narrower Interpretation: The patent's title ("...APPARATUS..."), abstract, and numerous figures (e.g., Figs. 2A-2D, 3) depict a discrete physical or logical unit. This consistent depiction could be used to argue that the term "subsystem" requires a degree of architectural separation from the host beyond that of a standard software application.
VI. Other Allegations
Indirect Infringement
The complaint alleges inducement to infringe based on Defendant's distribution of "product literature and website materials" that allegedly instruct customers to use the accused system in an infringing manner (Compl. ¶34). It also makes a conclusory allegation of contributory infringement (Compl. ¶31).
Willful Infringement
Willfulness is predicated on post-suit knowledge. The complaint alleges that Defendant has knowledge of its infringement "at least as of the service of the present complaint" and that it "actively, knowingly, and intentionally continued to induce infringement" after being served (Compl. ¶¶ 29, 35).
VII. Analyst’s Conclusion: Key Questions for the Case
- A core issue will be one of architectural scope: can the term "security subsystem," rooted in the patent’s disclosure of a distinct hardware/software "Security Utility Blade," be construed to cover the accused Netsurion XDR system, which is described as a software "platform"?
- A key evidentiary question will be one of functional operation: does the accused XDR system provide an "open platform for receiving and executing security function software modules from multiple vendors" as required by Claim 14, or is it a functionally integrated system that does not meet this element? The complaint provides no specific factual allegations to resolve this question.